Description
In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
Remediation
References
https://access.redhat.com/errata/RHSA-2020:0475
https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/
https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7
https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/
https://snyk.io/vuln/SNYK-JS-YARN-537806%2C
Related Vulnerabilities
CVE-2021-33609 Vulnerability in maven package com.vaadin:vaadin-server
CVE-2020-7704 Vulnerability in npm package linux-cmdline
CVE-2022-39312 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2020-7743 Vulnerability in maven package org.webjars.bower:mathjs
CVE-2016-10707 Vulnerability in maven package org.webjars.npm:jquery